EP1060607A1 - Procede et dispositif d'acces universel et protege a des reseaux telephoniques - Google Patents
Procede et dispositif d'acces universel et protege a des reseaux telephoniquesInfo
- Publication number
- EP1060607A1 EP1060607A1 EP99908839A EP99908839A EP1060607A1 EP 1060607 A1 EP1060607 A1 EP 1060607A1 EP 99908839 A EP99908839 A EP 99908839A EP 99908839 A EP99908839 A EP 99908839A EP 1060607 A1 EP1060607 A1 EP 1060607A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- identification
- subscriber
- features
- central computer
- biometric
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/38—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
- H04M3/382—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections using authorisation codes or passwords
Definitions
- the invention relates to a method and a device for universal and secure access to telephone networks with mobile accessibility of the user, in particular to telephone networks according to the preamble of claim 1 for the method and claim 6 for the device.
- Switching technology facilities that can be reached by a user via toll-free numbers are generally known today. After successful selection of the switching technology facility, the user must identify himself to the switching technology facility. This is usually done by entering an identification number, for example via the keypad of a telephone, using the tone dialing method or by voice input. Certain features or an existing credit in a certain currency or certain telephone units can be assigned to the identification numbers. The user can then call up the features or the credit after successful identification.
- An essential feature of this method is that no special terminal is required (tone dialing / voice input is sufficient) and there are no costs on site by dialing in via a toll-free number.
- the identification feature can have a "paid” or “still to be paid” character, the identification can be linked to either a specific fixed credit or an open billing procedure comparable to that of a normal telephone connection. Furthermore, special individual performance features can be linked to each individual identification. - 2 -
- calling card systems are usually based on a central control unit with a corresponding database or a central computer.
- VCC Virtual Calling Card
- PIN Personal Identification Number
- Authentication is carried out in a security module installed in the terminal.
- the security module receives the chip data and, based on a system key, calculates an individual card key located in the memory chip card.
- a method for checking memory chip cards is known from DE 196 04 349 AI, which enables two or more authentication using cryptographic functions and using a terminal.
- the disadvantage of these described methods and systems is that they require the user to provide an identification feature, for example a card number. For security reasons - 3 -
- this card number should be as many digits as possible.
- the user can specify the ID feature in relation to a machine or an intermediate operator.
- this procedure is lengthy and complicated in comparison with the usual telephony.
- the cumbersome handling keeps many potential users from intensive use of so-called calling card systems.
- the invention is therefore based on the object of providing a method and a device for universal and secure access to networks, in particular to the telephone network, in which the subscribers identify themselves to a system and the individual usage profile is checked and, after correct identification of the subscribers, access to the System and thus to the desired service, the billing is assigned to the identification, the identification is to be carried out on a mobile basis and / or biometric identifications are used.
- biometric identifications are generally known for security systems of all kinds, the application has - A -
- This identification above all has the advantage that biometric features can be stored on chip cards and that after the identification has been entered, a profile evaluation can also be carried out in the central computer. A check is carried out, for example, as to whether it is plausible that the participant can be at the respective input device at all. If a usage took place a few hours earlier from a remote location, then the participant is very likely not authentic. Furthermore, the method and the device according to the invention can be used to check against a usage profile as part of the identification check, that is to say how often, when, from which location, with what turnover and which usage properties are used, for example. This makes CallingCard systems easier and safer to use. The response times to identified security problems are considerably shorter compared to the previous method and the assignment of performance features for identification can now be carried out in the central computer or in a central control unit of the switching equipment.
- Fig. 1 is a schematic diagram for explaining the method according to the invention
- 3a shows a basic diagram for a
- Fig. 3b is a diagram showing the stay of a
- 3c shows a diagram for the services used by customers.
- Terminal 1 shows two terminals 2 and 3, which have a reading device for identifying a subscriber. These terminals 2 and 3 are each used by a mobile data carrier 1 for identification with the system, in particular the calling card system.
- the biometric identifications shown in principle below, for example can also be carried out, for example with the aid of iris recognition, with the aid of fingerprint recognition or with the aid of special speech features.
- Terminal 2 is connected to the calling card system in the present example via a dial-up network 4. In the present example, this consists of a central computer 6 which is connected to a database 7 and a unit for identification 8. In the calling card system, the identification is checked and the performance features are assigned for identification. After the participant has been correctly identified, they will be given access to the - 6 -
- a mobile data carrier 1 is used in this method as identification, which automatically sends the identification to a specially equipped terminal 2 or 3.
- a biometric feature or two biometric features or more are transmitted as identification for the purpose of greater security. After checking the identification in the unit for identification check 8, the performance features are assigned to the respective identification.
- Identification can be increased in the security standard, for example, by additional secret information, for example a personal identification number. Above all, it is also interesting to combine the biometric identification features, for example the iris, the fingerprint and / or the language features for subscriber identification. This significantly increases the security standard without complicating the test procedures.
- the biometric identification in the form of iris, fingerprint and / or language features can above all be stored in addition to the existing security identifications, such as a personal identification number.
- FIG. 2 again shows a basic illustration of a system for carrying out the method. It in turn consists of a dial-up network 4 or a direct connection 5 with an identifier 9 in on one side - 7th
- the identifier 9 can again identify itself with the help of a mobile data carrier by means of biometric identification features.
- Type testing of the identification of the biometric features can be done by storing the properties on the chip card.
- a profile evaluation is first carried out in the central computer 6. For example, it is checked whether it is plausible that the subscriber can be at the terminal at all.
- a user profile is stored in the unit for the identification check 8, for example, which indicates the location and the day on which a particular subscriber or the identifier 9 was or is located. Such a diagram is shown in Fig. 3b.
- 3a shows the usage behavior of an identifier 9 as an example, in which, for example, the sales made are shown on one day or on several days. This profile is then also saved in the unit for the identification check and is updated again and again. Furthermore, as part of the identification check, a check is made against a usage profile shown in FIG. 3c, that is to say how often, when, from which location, with which turnover which usage properties are used. For this purpose, the customers C1 to C3 are shown in the diagram on the vertical and the services DLa to DLd used on the horizontal. - 8th -
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Telephone Function (AREA)
Abstract
L'invention concerne un procédé et un dispositif d'accès universel et protégé à des réseaux, notamment des réseaux téléphoniques à système de carte d'appel où les abonnés doivent être identifiés par ledit système. Si l'identification est correcte, l'abonné reçoit l'autorisation d'accéder au système. L'abonné bénéficie ensuite du service voulu, la taxation étant adjointe à l'identification. Pour la procédure d'identification, il est prévu un support de données (1) qui envoie l'identification sous forme de signe distinctif biométrique sur un terminal (2,3) équipé spécialement à cet effet, automatiquement par l'intermédiaire d'un réseau commuté, d'un réseau mobile ou d'un réseau fixe, à un ordinateur central (6) comportant une unité de vérification d'identification (8). Lorsque les signes distinctifs sont mémorisés sur un support de données (1) mobile, il est ensuite prévu pour renforcer la sécurité, une évaluation de profil dans l'ordinateur central (6) ou dans l'unité de vérification d'identification (8). A cet effet, il intervient par exemple une vérification de plausibilité qui consiste à vérifier si la personne identifiée peut toutefois rester sur un terminal (2,3) déterminé. Si quelques heures auparavant il y a eu utilisation depuis un endroit éloigné, la probabilité que l'abonné ne soit pas authentique est élevée. En cas de vérification positive d'identification, des caractéristiques d'exploitation sont automatiquement attribuées à l'abonné. Lesdites caractéristiques d'exploitation sont par exemple mémorisées dans une banque de données (7) reliée à l'ordinateur central (6).
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19809043A DE19809043A1 (de) | 1998-03-04 | 1998-03-04 | Verfahren und Vorrichtung zum universellen und gesicherten Zugang zu Telefonnetzen |
DE19809043 | 1998-03-04 | ||
PCT/EP1999/000709 WO1999045690A1 (fr) | 1998-03-04 | 1999-02-03 | Procede et dispositif d'acces universel et protege a des reseaux telephoniques |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1060607A1 true EP1060607A1 (fr) | 2000-12-20 |
Family
ID=7859562
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP99908839A Withdrawn EP1060607A1 (fr) | 1998-03-04 | 1999-02-03 | Procede et dispositif d'acces universel et protege a des reseaux telephoniques |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1060607A1 (fr) |
DE (1) | DE19809043A1 (fr) |
WO (1) | WO1999045690A1 (fr) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10000973A1 (de) | 2000-01-06 | 2001-07-12 | Deutsche Telekom Ag | Verfahren zur sprachgesteuerten Identifizierung des Nutzers eines Telekommunikationsanschlusses im Telekommunikationsnetz beim Dialog mit einem sprachgesteuerten Dialogsystem |
GB2363237A (en) * | 2000-06-10 | 2001-12-12 | Secr Defence | Integrated security system |
DE10043447A1 (de) * | 2000-09-04 | 2002-03-28 | Bioid Ag | Verfahren und System zur Freischaltung eines mobilen Endgerätes |
DE10054633C2 (de) * | 2000-10-13 | 2003-05-22 | Christian Hogl | Verfahren und System zum Kontrollieren des Zugangs zu Waren und Dienstleistungen |
DE10064040A1 (de) * | 2000-12-21 | 2002-07-18 | Tenovis Gmbh & Co Kg | Rechnergesteuertes Vermittlungssystem mit Leistungsmerkmalen und Verfahren zur Steuerung und Nutzung von Leistungsmerkmalen |
EP1235189A1 (fr) * | 2001-02-26 | 2002-08-28 | Keyware Technologies | Capteur biométrique |
DE102004014416A1 (de) * | 2004-03-18 | 2005-10-06 | Deutsche Telekom Ag | Verfahren und System zur Personen/Sprecherverifikation über Kommunikationssysteme |
DE102005003208B4 (de) * | 2005-01-24 | 2015-11-12 | Giesecke & Devrient Gmbh | Authentisierung eines Benutzers |
DE102007054474A1 (de) * | 2007-11-13 | 2009-05-28 | Vodafone Holding Gmbh | Verfahren und System zur Kommunikation mit einem Mobilfunknetz |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4899373A (en) * | 1986-11-28 | 1990-02-06 | American Telephone And Telegraph Company At&T Bell Laboratories | Method and apparatus for providing personalized telephone subscriber features at remote locations |
US5345595A (en) * | 1992-11-12 | 1994-09-06 | Coral Systems, Inc. | Apparatus and method for detecting fraudulent telecommunication activity |
US5583933A (en) * | 1994-08-05 | 1996-12-10 | Mark; Andrew R. | Method and apparatus for the secure communication of data |
-
1998
- 1998-03-04 DE DE19809043A patent/DE19809043A1/de not_active Ceased
-
1999
- 1999-02-03 EP EP99908839A patent/EP1060607A1/fr not_active Withdrawn
- 1999-02-03 WO PCT/EP1999/000709 patent/WO1999045690A1/fr not_active Application Discontinuation
Non-Patent Citations (1)
Title |
---|
See references of WO9945690A1 * |
Also Published As
Publication number | Publication date |
---|---|
DE19809043A1 (de) | 1999-09-09 |
WO1999045690A1 (fr) | 1999-09-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE69926977T2 (de) | Anruferidentifizierungsauthentisierung und Leitweglenkung als Antwort hierauf | |
DE60121135T2 (de) | Dienstaktiverung mittels einer virtuellen vorausbezahlten karte | |
EP1240631A1 (fr) | Procede et systeme de transaction de paiement | |
EP2174281A2 (fr) | Carte prépayée ou de crédit virtuelle et procédé ainsi que système de fourniture de celle-ci et de gestion de paiement électronique | |
EP0805607B1 (fr) | Méthode d'accès d'au moins une partie des données d'une carte à microprocesseur | |
EP1306789A2 (fr) | Serveur pour bloquer des cartes bancaires | |
EP1060607A1 (fr) | Procede et dispositif d'acces universel et protege a des reseaux telephoniques | |
DE19609232A1 (de) | Verfahren und Vorrichtung zum universellen und gesicherten Zugang zu angebotenen Multimediadiensten über das Telefonnetz | |
WO2005117404A1 (fr) | Procede d'autorisation d'une transaction telephonique et noeud de commutation | |
WO2000039758A1 (fr) | Procede de manipulation fiable de monnaie ou d'unites de valeurs avec des supports de donnees prepayes | |
EP1860595B1 (fr) | Carte à puce dotée dýau moins deux identités | |
DE4441413C2 (de) | Datenaustauschsystem | |
DE60026316T2 (de) | System und verfahren zur bearbeitung von fernsprechanrufen | |
DE4231937C1 (de) | Verfahren zum Feststellen der Identität des Inhabers einer Chipkarte, inbesondere Kreditkarte | |
EP0935870B1 (fr) | Systeme d'authentification d'un reseau de communication | |
DE4406590C2 (de) | System zur Authentifizierung von Anrufern | |
WO2007036341A1 (fr) | Deblocage de cartes de telephonie mobile | |
EP0935869B1 (fr) | Procede pour rendre toute eventuelle utilisation frauduleuse difficile dans des services de telecommunications | |
DE102005003208A1 (de) | Authentisierung eines Benutzers | |
DE60221749T2 (de) | Eröffnen einer Subscription in einem Mobilfunksystem | |
EP3629542B1 (fr) | Délivrer des données confidentielles au moyen d'un téléphone fixe | |
EP1414259A1 (fr) | Procédé pour détecter un module d'identification doublé | |
EP1370107B1 (fr) | Méthode et appareil pour accéder à des données de portabilité de numéros | |
EP1115242B1 (fr) | Authentification d'un abonné d'un service de télécommunication à l'aide d'une adresse souvent composée | |
EP0818760B1 (fr) | Méthode pour empêcher l'abus de modules |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20001004 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE |
|
17Q | First examination report despatched |
Effective date: 20020809 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20021220 |